gpg-key2ps in signing-party 1.1.x and 2.x before 2.10-1 contains an unsafe shell call enabling shell injection via a User ID.
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
Link | Tags |
---|---|
https://bugs.debian.org/928256 | mailing list exploit third party advisory issue tracking |
https://lists.debian.org/debian-lts-announce/2019/05/msg00001.html | third party advisory mailing list |
http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00029.html | vendor advisory mailing list third party advisory |